mirror of
https://github.com/papers-we-love/papers-we-love.git
synced 2024-10-27 20:34:20 +00:00
Add files via upload
- Classifies memory attacks into a hierarchy that is usable by both black- and white-hats. - An excellent primer on the different memory-related vulnerabilities that exist, (more importantly) why they exist, and the ways in which various defences act to counter them. Update README.md Include year in README Update README.md
This commit is contained in:
parent
d5122b2e6f
commit
a7e00370fe
@ -9,3 +9,6 @@
|
||||
* :scroll: [Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud (2014)](macaroons-cookies-with-contextual-caveats.pdf)
|
||||
|
||||
* :scroll: [Insertion, Evasion, and Denial of Service: eluding network intrusion detection (1998)](ids-evasion-ptacek-newsham.pdf)
|
||||
* :scroll: [SoK: Eternal War in Memory (2013)](sok-eternal-war-in-memory.pdf)
|
||||
- Classifies memory attacks into a taxonomy that is usable by both black- and white-hats.
|
||||
- An excellent primer on the different memory-related vulnerabilities that exist, (more importantly) why they exist, and the ways in which various defences act to counter them.
|
||||
|
BIN
security/sok-eternal-war-in-memory.pdf
Normal file
BIN
security/sok-eternal-war-in-memory.pdf
Normal file
Binary file not shown.
Loading…
Reference in New Issue
Block a user